setup.exe

InstallVibes

This is the installer and setup program from the InstallVibes branded Yontoo adware web browser extension. This adware injects various forms of advertisements in the user's web browser based on the HTML content and URLs viewed. Ad include banners, in-line context text links, coupons, and search. The program will install an auto-updating background service that will update the software with additional features. The application setup.exe by InstallVibes has been detected as adware by 28 anti-malware scanners. It uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
InstallVibes  (signed and verified)

MD5:
daa97562d8455d9225012a0a12e88719

SHA-1:
4dfaa66c94237add8df4872269855a7a220bb099

SHA-256:
5e1cdfc5b662c417b6c58c338766b6d0c019deb642d2b1dc64744213f8d51f7d

Scanner detections:
28 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Analysis date:
12/27/2024 3:08:37 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.11393575
6295025

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
Trojan/Win32.Zbot
2014.12.27

Avira AntiVirus
TR/Dropper.Gen
7.11.30.172

avast!
Win32:Adware-gen [Adw]
141214-1

AVG
Bundlo
2015.0.3248

Bitdefender
Trojan.Generic.11393575
1.0.20.1800

Clam AntiVirus
Win.Trojan.Bundlore-10
0.98/19841

Comodo Security
Application.Win32.Bundlore.H
20490

Dr.Web
Adware.Downware.4744
9.0.1.05190

Emsisoft Anti-Malware
Trojan.Generic.11393575
9.0.0.4668

ESET NOD32
Win32/Bundlore.H potentially unwanted application
7.0.302.0

F-Prot
W32/Dropper.gen8
4.6.5.141

F-Secure
Trojan.Generic.11393575
5.13.68

G Data
Trojan.Generic.11393575
14.12.24

K7 AntiVirus
Unwanted-Program
13.188.14468

Malwarebytes
v2014.12.26.08

McAfee
Program.PUP-FKW
16.8.708.2

MicroWorld eScan
Trojan.Generic.11393575
15.0.0.1080

NANO AntiVirus
Riskware.Win32.Downware.ddpjxj
0.30.0.64448

Norman
Trojan.Generic.11393575
04.12.2014 14:30:06

nProtect
Trojan.Generic.11393575
14.12.26.01

Panda Antivirus
Trj/Genetic.gen
14.12.26.08

Reason Heuristics
PUP.Installer.InstallVibes.F
14.12.26.19

Sophos
PUA 'Bundlore'
5.09

SUPERAntiSpyware
PUP.Bundlore
10153

VIPRE Antivirus
Threat.4150696
35418

Zillya! Antivirus
Adware.Agent.Win32.10638
2.0.0.2017

File size:
240.3 KB (246,016 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/19/2014 7:00:00 PM

Valid to:
3/19/2016 6:59:59 PM

Subject:
CN=InstallVibes, O=InstallVibes, STREET=Ehad Haam 21 St., L=Tel Aviv, S=Israel, PostalCode=6515103, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00F29201EBC1EAD2B751F2854AD68C6244

File PE Metadata
Compilation timestamp:
6/16/2014 7:41:50 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
6144:9ZyMeM8GKfnY3GCgc1Xz8FbCddDoxoec0aU4dJ:9ZyMehG1cID8FbCddEaU47

Entry address:
0x28F2

Entry point:
E8, 98, 34, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 18, 6B, 41, 00, E8, 38, 25, 00, 00, E8, 69, 36, 00, 00, 0F, B7, F0, 6A, 02, E8, 2B, 34, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, EA, 2B, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
7.1579

Code size:
62.5 KB (64,000 bytes)

The file setup.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to wac.edgecastcdn.net  (72.21.81.13:80)

TCP (HTTP):
Connects to service.yontoo.com  (8.25.35.148:80)

TCP (HTTP):
Connects to api.yontoo.com  (8.25.35.15:80)

Remove setup.exe - Powered by Reason Core Security